Search Results - (( using personal method algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Back in the days, before computers and IT were widely used, history matching was done manually by trial and error method, where personal judgment were very critical in undergoing such methodology. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5
  6. 6
  7. 7

    Estimating the total Malaysian road accidents and fatalities using Gauss-Newton method of least squares / Maureen Giman, Siti Zulaikha Muhamad Zuraidi and Syahida Asyikin Moner by Giman, Maureen, Muhamad Zuraidi, Siti Zulaikha, Moner, Syahida Asyikin

    Published 2022
    “…The iterative process of Broyden's approach is nearly identical to Newton's method. Meanwhile, the Levenberg-Marquadt method uses the gradient descent algorithm, which also has a similar algorithm to the Gauss-Newton method in finding the value for the unknown parameter.…”
    Get full text
    Get full text
    Student Project
  8. 8

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…The modified πRKM is able to perform better partition by identifying the overlapping objects between the correct clusters and also capable to do a re-partition using the indiscernibility relation function. Thirdly, the local and global similarity algorithm is proposed to classify the current user pages request to produce recommendations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A Non‑cooperative Uplink Power Control for CDMA Wireless Communication System by Ali Farzamnia, Eng Soo Yew, Ervin Gubin Moung

    Published 2020
    “…Therefore, enhanced Nash algorithm (ENA) is proposed which only applicable in frst iteration of power control method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, Norshuhani, Oxley, Alan, Abu Bakar, Zainab

    Published 2012
    “…Named Entity Recognition (NER) is the identification of words in text that correspond to a pre-defined taxonomy such as person, organization, location, date, time, etc.This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism.A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism.The English corpus is the translated version of the Malay corpus.Hence, these two corpora are treated as parallel corpora. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  17. 17

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  18. 18

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  19. 19

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  20. 20

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis